Searched for: subject%3A%22cyber%255C+security%22
(1 - 20 of 40)

Pages

document
Pigmans, Max (author)
Most of the adversarial attacks suitable for attacking decision tree ensembles work by doing multiple local searches from randomly selected starting points, around the to be attacked victim. In this thesis we investigate the impact of these starting points on the performance of the attack, and find that the starting points significantly impact...
master thesis 2024
document
Gnanavarothayan, Kabilan (author)
The use of Internet of Things (IoT) devices has experienced an increase since its inception and is expected to continue to do so. However, this growth has also attracted individuals with malicious intentions. Botnet attacks on IoT devices have become more potent each year, exploiting new vulnerabilities and attacking more devices. Therefore, it...
master thesis 2023
document
ZHANG, JIAXUAN (author)
Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...
master thesis 2023
document
Kruijsse, Hendrik Jan (author)
Nowadays, the society strongly depends on computer networks and systems as a means of reliable communication and data storage. In order to maintain absolute security of the networks and thus the society, one would need to separate everything, but this is not feasible. Consequently, sharing of resources is inevitable. There are security products...
master thesis 2023
document
Al-Kaswan, Ali (author)
Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...
master thesis 2022
document
Thiessen, Sven (author)
The uprise of the Internet of Things (IoT) has been a hot topic for several years. While many see these devices and think they bring ease to their lives, it is far from reality. Researchers found many privacy and security problems within these devices in the last years. The popularity of these devices causes many users to bring a device into...
master thesis 2022
document
Steenbrink, Tim (author)
Recent advances in the field of ‘Zero Trust’ security strategies have revealed that there is still much novelty regarding the concept of Zero Trust architecture (ZTA). Zero Trust has recently gained attention as the traditional approach, based on network perimeter security, is being outplayed by sophisticated cyber attacks. This research...
master thesis 2022
document
Maquelin, Suzanne (author)
Interpreted applications are often vulnerable to remote code execution attacks. To protect interpreted applications, we should reduce the tools available to the attackers. In this thesis, we investigate the possibilities for the automation of policy generation for interpreted applications in terms of system call arguments. These policies are...
master thesis 2022
document
de Los Santos Subirats, Alex (author)
Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...
bachelor thesis 2022
document
Jeong, Yoon Hwan (author)
In order to combat increasing spam calls, many applications are developed and downloaded to block those calls. Some studies about performance of the applications were previously conducted, however, the actual processes the applications go through to intercept and block the spam calls are not well studied. This research presents a method to...
bachelor thesis 2022
document
van de Weijer, Teun (author)
master thesis 2022
document
Mulder, Tijmen (author)
From 2019 into 2021, phishing incidents tripled, while phishing was found to be the largest used cyberattack vector. One commonly used type of phishing is a credential phishing attack over email. This is an act where an attacker tries to steal credential information from a target via a phishing website. This phishing website is delivered to the...
master thesis 2022
document
Ranade, Vedang Suhas (author)
Industrial control systems (ICSs) are used widely throughout the world for the control of large, complex industrial plants and consist of the entire setups of control system including sensors, PLCs (Programmable Logic Controllers), actuators and communication devices. The communication between these ICS devices is performed using industrial...
master thesis 2021
document
Kerkhof, Maikel (author)
Deep learning techniques have become the tool of choice for side-channel analysis. In recent years, neural networks like multi-layer perceptrons and convolutional neural networks have proven to be the most powerful instruments for performing side-channel analysis. Recent work on this topic has focused on different aspects of these techniques,...
master thesis 2021
document
van Gurp, Ralph (author)
Malware presents a growing problem in a world that is increasingly connected to, and reliant on, the internet. The growing, devastating potential of cyber attacks such as DDoS attacks on society and economy is largely the result of a new class of devices, the Internet of Things (IoT), whose characteristic vulnerabilities make them easy targets...
master thesis 2021
document
Stefanov, Radoslav (author)
Blockchain networks have gained recent popularity among organisations that want to make use of the security aspects that blockchain provides. Fabric is one of the most used distributed network technologies, most commonly applied in scenarios that require confidential data to be stored securely and privately. Use case examples are finance,...
bachelor thesis 2021
document
Yüksel, Akif (author)
Kyber is a Decentralized Finance (DeFi) system which runs on the Ethereum blockchain. DeFi aims to remove centralized intermediaries such as Market Makers. An Automated Market Maker (AMM), implemented in a smart contract, is a decentralized version of these. Kyber's Dynamic Market Maker (DMM) is a next-generation AMM which solves two issues:...
bachelor thesis 2021
document
de Bruijn, Vasco (author)
In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of...
master thesis 2021
document
van Rijn, Vincent (author)
Virtualization is the fundamental technology that enabled the widespread adoption of cloud computing. With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees and low performance overhead from isolation platforms are paramount. An ideal isolation platform offers both: an infallible isolation boundary...
master thesis 2021
document
Cao, Clinton (author)
The Internet is a technology that was invented in the 1960s and was used only by a few users to do simple communications between computers. Fast forward to 2020, the Internet has become a technology that is being used by billions of users. It allows users to communicate with each other across the world and even allows users to access data...
master thesis 2020
Searched for: subject%3A%22cyber%255C+security%22
(1 - 20 of 40)

Pages